On Nov 22, 2006, at 12:25 PM, Hallam-Baker, Phillip wrote:
From: Douglas Otis [mailto:[EMAIL PROTECTED]
This presumes bad actors are blocked by an easily defeated
scheme. Guidance offered by SPF suggests the numbers blocked is
less than 3%. In addition, blocking is not as black and white as
you suggest. What happens when someone sends a message to a
mailing list?
This presupposes that the issue is blocking rather than cost control.
Making millions of unanswered queries will increase costs.
Spam filtering is a real cost. AOL, Gmail, Hotmail, Yahoo all use a
very significant amount of electricity feeding machines whose sole
purpose is spam control.
It seems to be bad advice to suggest MTAs should scan for records
that seldom exist, where then only a small percentage that are
published are also "actionable". This is not something that should
be done for every message. The common strategy is to petition
providers for specific treatment. The financial industry could
create their own lists and guidelines. Part of this effort could
consolidate local part addresses and identifiers of transactional email.
Large providers commonly white-list "okay" domains known to be either
large, or small but sending bulk. However, DKIM allows white-listing
to be abused, especially in the case of large domains. : (
There should be a safe method established that associates signing
domains with SMTP clients to permit safe white-listing using DKIM.
Composing white-lists and lists of financial institutions agreeing to
specific practices will save a substantial number of joule/seconds
and carbon emissions. An authorization record published by joe-
random domain instead will do the opposite.
If we assume that 30% of the market is those three providers then
9% of the emails sent are going to be internal between just those 3
email providers.
It seems this small amount of information could be contained within a
short list, thereby saving wasted cycles looking for records that do
not exist.
If we assume that the email bill for each email provider's spam
control is $1 million a month, the ability to whitelist email sent
within just that group translates to approximately $1 million per
provider per year in electricity saved alone.
Your figures do not pay for the network resources and IO limited
machines required to support the slew of queries that are almost
always returning nothing. : (
That is not a bad ROI at all. and reduced carbon emissions.
DKIM still requires a method to protect the use of the signature for
white-listing large domains. This can be done with a single DNS
transaction that associates the signing domain with the SMTP client.
This would be done only when the domain is already white-listed to
ensure a message is not being replayed by some unknown third-party.
An authorization record does nothing to enable the safe use of the
DKIM signature for white-listing.
Of course the senders are not stupid and they will avoid using
those domains to send spam to if they know that checking is in
place. So the only spams that are getting caught are going to be
from the stupid spammers.
DKIM can not prevent spam! Stopping the phishing attempts is best
done by making phishing unsuccessful. An MUA that only annotates
DKIM signed messages found in the recipient's address-book is the
best way to stop this traffic. An alternative might be to annotate
those messages found on an industry white-list. Relying upon an
authorization scheme is dangerous for the recipient told an
authorization scheme offers them protection, that is in fact worthless.
Checking a digital signature is much less expensive than any of the
effective spam checking schemes I know of. The ROI is not in the
mail you block, its in the mail you whitelist.
Yes and no. There still must be a reasonable way to prevent replay
abuse.
If you are a legitimate email sender you will find that adding a
DKIM signature to your message is cheaper than constantly dealling
with the major ISPs to get your mail server whitelisted. It also
means that you can be protected if you happen to find yourself co-
located on the same box as a spammer without your knowledge.
At this time, that will not likely true. Currently there is no means
to associate a message envelope with that of the DKIM signature.
Reputations services will be taking a substantial risk accruing
unsolicited messages against the DKIM signature, or using the DKIM
signature for white-listing without a means to confirm the message
was intended to be sent by the signing domain. Once again the SMTP
client association can make this assertion true.
DKIM base is not about increasing rejects, it is about reducing the
cost of accepts.
Perhaps. DKIM seems like a good idea that still has a few loose ends.
DKIM policy is about deterring impersonation. The actual number of
rejects is not significant. In fact you want it to be low rather
than high.
Agreed. Here annotation can play a major role in changing the
behavior of bad actors instead.
-Doug
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html